How AI Can Accelerate Cybersecurity

How AI Can Accelerate Cybersecurity

Released Tuesday, 22nd October 2024
Good episode? Give it some love!
How AI Can Accelerate Cybersecurity

How AI Can Accelerate Cybersecurity

How AI Can Accelerate Cybersecurity

How AI Can Accelerate Cybersecurity

Tuesday, 22nd October 2024
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:03

Hello, Hello, Welcome to Smart Talks with IBM,

0:06

a podcast from Pushkin Industries, iHeart

0:09

Radio and IBM. I'm

0:11

Malcolm Glapwell. This season,

0:13

we're diving back into the world of artificial intelligence,

0:16

but with a focus on the powerful

0:19

concept of open its

0:21

possibilities, implications,

0:23

and misconceptions. We'll look

0:25

at openness from a variety of angles and

0:28

explore how the concept is already reshaping

0:30

industries, ways of doing business

0:33

and our very notion of what's possible.

0:36

On today's episode, I'm joined by Jason

0:38

Kelly, the global Managing Partner for

0:40

IBM Strategic Partners and Ecosystems,

0:43

and by Christy Fredericks, the Senior

0:45

Vice president and Chief Partnership

0:48

Officer at Palo Alto Networks.

0:51

We discussed how their partnership in

0:53

the cybersecurity space helps strengthen

0:56

enterprises by focusing on seamless

0:58

cybersecurity solutions tailored

1:01

to meet the evolving threat landscape.

1:04

By leveraging AI and automation, this

1:06

collaboration aims to modernize security

1:08

programs, improve response times,

1:11

and produce risks. Jason

1:14

and Christie both bring a tremendous

1:16

amount of experience and expertise

1:18

to the subject I think

1:20

you're really going to enjoy this one.

1:34

Jason Christy, Welcome to Smart Talks

1:36

with IBM. Thank you for joining me.

1:38

Thank you.

1:38

It's great to be here.

1:40

We are here to discuss cybersecurity and

1:42

the partnership between IBM and

1:44

Palo Alto Networks. But before we get there,

1:47

I wanted you guys to tell me a little bit about

1:49

yourself. Jason's

1:52

start with you. I see on your resume

1:55

west Point, which makes we

1:57

think there's some interesting things going

1:59

on. How did you get to west Point?

2:02

West Point? West Point was the decision. First,

2:04

it was it was affordable back in the

2:06

day. But I had a sense of service.

2:08

My father was a World War Two vet, so

2:11

I grew up on the weekends watching World War

2:13

two video. You know he's

2:15

army as well. Yeah, and so I

2:18

thought, oh, that'd be exciting, and

2:21

I thought I do some type of service.

2:23

Went there and now I have the biggest

2:25

family, extended family I could ever

2:27

have.

2:27

So it was very exciting.

2:29

Played football lucked out, meaning

2:32

I wasn't recruited.

2:34

I walked on and

2:36

that kept.

2:37

Me there because it gave me something and out left with

2:39

all the other pressures defensive

2:41

back, I was I was great at knocking the

2:43

ball down, not the best at catching it.

2:45

Yeah,

2:47

and then you were a ranger.

2:49

I was.

2:50

I was privileged to be a US Army airborne

2:52

ranger station, but did most of my time

2:54

in northern Italy. We're part of the it's

2:57

eighty second airbarnship post. Oh yeah,

3:00

people say seriously, like, you know, you were,

3:02

you were, you were drinking wine and having

3:04

bred, you know, but it was.

3:07

We're part of a NATO force there at

3:09

the time. Yeah, so exciting.

3:11

How did you get from there to IBM?

3:15

A long path.

3:17

As I came out of the military, I started

3:19

manufacturing retail housing

3:23

and

3:25

did a quick stint, took a leave of absence from

3:27

industry, and did

3:30

a stint of yet again public service

3:33

in the state of Tennessee with economic development,

3:36

and got a whiff of how

3:38

fun it could be to do things around data

3:41

and media. Started a small

3:43

media firm what we would now call a digital

3:45

firm, sold it

3:47

and said I wanted to go do it

3:50

again somewhere, but I wanted to go to

3:52

a big company. And the family at IBM

3:54

brought me in and yet to let

3:56

me go.

3:56

That was how many years ago, two

4:00

decades oh wow, Yeah.

4:01

So I know I look amazingly young on but yes,

4:05

you must have.

4:06

And IBM was my fifth career and and

4:09

and I've enjoyed a since. And that's what

4:11

I what I do.

4:12

They build teams, grow new parts of the

4:14

company and get to work with some of the

4:16

most brilliant people on the face

4:18

of the planet, as well as partners like

4:21

Christy that just keep it exciting.

4:23

Christy, you're I was delighted to learn that you are

4:25

Canadian.

4:25

Yes from here?

4:28

Yeah.

4:29

But you so you were a consultant

4:31

for a long time at Bane.

4:33

Yes. Yeah. I joined Bain Consulting

4:35

intending to spend a couple of years there learn

4:38

the ropes and then go get my first real job. But

4:40

the value personally to my growth

4:42

and development, and then that we were able to bring our

4:44

clients. I ended up there for sixteen years,

4:47

and then post Bain went on

4:49

to another my first product company,

4:51

a new relic, and then it's come full

4:53

circle at Powlta Networks. But at

4:55

Bain it was all about bringing

4:58

expertise across different industries to help our

5:00

clients improve whatever they needed

5:02

to improve and bringing that expertise

5:04

to bear. And then you have the product

5:06

lens and you think, Okay, we're going to build the absolute best

5:08

product to help our customers do

5:10

what they need to get done. And then I joined

5:13

pal Alto about six seven months ago in

5:16

a partnership's role and I'm delighted

5:18

to be able to work with amazing consulting companies

5:20

like IBM where we bring both to bear.

5:23

How long have IBM and Paulo Alto Network's

5:25

been partners?

5:26

So we've been We've been working together for

5:29

quite quite a long time, but we made

5:32

it official, meaning we got married as

5:34

strategic partners last year.

5:36

Oh I see. So what is it that each of

5:38

you bring to the table? What's each

5:40

side special?

5:41

So it's great that you asked that because

5:43

about a decade ago, are now

5:46

CEO Arvin Christ says, you

5:48

know, it wouldn't be great if we just had this

5:50

one focus with this what does IBM do? And

5:52

you have this whole list, and he says, let's

5:54

make it simple. We are a

5:57

multi cloud, hybrid cloud a

5:59

company. And so when you say

6:01

that, it sounds very simple, but then.

6:03

People, what the hell is that? What your

6:06

hybrid cloud?

6:07

Well, both of those two things have

6:09

a lot of data involved and a lot of

6:11

those mean that that data is

6:13

going to sit in multiple places and distributed

6:15

environments. Well, if you're

6:17

able to tie those things together with multiple

6:20

partners, you also have to make sure

6:22

that it's secure because

6:25

in the direction that we're going, where data is

6:28

now being consumed in many different

6:30

places and it is the fuel behind AI

6:32

as we know, then you say, ah,

6:35

well, who does that well and

6:38

who does it in a way that's getting

6:40

rid of seams, the seams that could be across

6:42

multiple products, multiple product

6:44

SATs even And that's where Powell comes

6:46

in.

6:47

I think the conventional

6:49

wisdom and cybersecurity was always you need

6:52

all the new tools, right, you need it every

6:54

threat. It's like, whack them all. Every threat that pops up,

6:56

you get the tool that's purpose built for that specific

6:59

thing. Well, fast forward to you

7:01

know, the RSA conference this year, there were four

7:03

thousand vendors on the floor. You

7:06

look at an average company, there's hundreds of cybersecurity

7:08

tools. It introduces a level

7:11

of complexity that is

7:13

really hard to manage you as a

7:15

user. Query and application,

7:17

right, that query

7:19

can go through a bunch

7:22

of different pings from one cloud to the next.

7:24

It goes into and out of assaas application. It maybe

7:26

running along a network. You may be accessing

7:28

it from your phone, which is an unmanaged device. It's

7:31

got to go in and out. And if you say, okay,

7:33

I've got to secure that phone, I've

7:35

got to secure the network, I've got it. And

7:37

then all of a sudden you've got sort of firewalls, software

7:40

and hardwelfiles popping up everywhere. You've

7:42

got cloud security, and it's you've

7:44

probably heard of this concept of zero trust, which is every

7:46

time you have to check and say are you allowed in here? Are

7:48

you allowed in here? The number of places that

7:51

can fall down it just becomes overwhelming.

7:53

So you end up with either alerts

7:55

firing, you know, every

7:58

two seconds that you have to then go invest again,

8:00

most of which are false positives or

8:03

you miss something right. And

8:05

so that was the conventionalism was we've got to buy all

8:07

these tools, and now you've got overwhelmed

8:09

CIOs and CSOs with hundreds of tools,

8:11

and Palo Alto strategy has been, look, we're

8:14

going to create a platform where everything can

8:16

be stitched together, everything can speak the same language,

8:19

and we can sort of manage

8:22

throughout the architecture and watch, you know,

8:24

this call as as it's passing through

8:27

all these different checkpoints, and

8:29

we can do it in a way that you still have the confidence

8:31

that it's best to breed right, so you're not making any

8:34

trade offs. But it's not so simple just

8:36

to get from the spaghetti to the

8:38

seamless architecture. You need, oftentimes

8:41

to re engineer your business processes. You

8:43

have to re architect your digital environment.

8:46

And so that's where we partner with a company

8:48

like IBM to bring that expertise and

8:50

say we're going to help you not just deploy

8:52

the best cybersecurity architecture, but really get

8:54

your environment ready to have this zero

8:56

testomer.

8:57

As well as all of those players that cross

9:00

at spaghetti. Because when

9:02

you start thinking about all the other partners

9:04

that you work with, if you're you think of an industry

9:06

perspective, you're going to have an ERP. It

9:09

could be an Oracle, it could be an SAP. You're

9:11

not going to have one cloud, as I mentioned, it's gonna be possibly

9:14

multiple clouds. You'll have some AWS

9:16

maybe Microsoft Asure and then even even

9:19

some Google in there, and then your own that you've

9:21

built in your private over there.

9:23

Uh, some an IBM cloud.

9:26

You'll have those multiple clouds, and then you

9:28

also will have you know, fit for purpose.

9:31

Oh I need a I need a salesforce

9:33

in there for my customer focusing.

9:35

I need I'm doing some graphics, so I have Adobe, so I

9:37

just as I can name name name, all

9:40

of those then have to

9:42

be re engineered seriously.

9:44

I mean, come on, Malcolm, You're gonna sit there.

9:46

You think how long that would take. So if

9:49

you haven't done that before,

9:52

you're going to have to go to each one of those individually, or

9:54

you can work with a company that can

9:56

tie those things together, because we are also

9:58

strategic partners with them.

10:00

So that's where you start to say, Okay, I

10:03

see how this comes together. You

10:06

have to make sure that your ecosystem

10:09

is going to be stronger than your competitor's ecosystem,

10:11

and you have to be secure in what you're doing

10:14

because as you add more players or products,

10:16

you create seams, and you want to make

10:18

sure there's fewer seams and

10:20

that there's zero trust across

10:23

that capability you're building. And

10:25

that's why the compliment between the two

10:27

companies.

10:28

We'll take a step back from a moment before we

10:30

sort of launch once get into the specifics

10:33

of what you guys are doing. I'm curious

10:35

at this moment in twenty

10:37

twenty four, how

10:39

nervous should we be

10:42

about cybersecurity? So compared it

10:44

to five years ago or

10:47

ten years ago, are we Are

10:49

you less nervous than you were five years ago or more

10:51

nervous or all of changes going on

10:53

right now increasing vulnerability

10:56

or decreasing it.

10:58

I would say Chris, also,

11:00

I think we share the point of views that it's

11:03

not necessarily being more nervous.

11:05

I think you should be more prepared.

11:08

Yeah, because the amounts

11:10

of threat is increasing

11:13

based on our dependence upon data.

11:16

And that's that's where I

11:18

think the attention should be placed. Is

11:20

that more and more, especially with

11:22

the importance of AI that

11:26

you say, okay, then what's under all that?

11:27

And it's the data?

11:29

As I said, So knowing

11:31

that you should be more concerned.

11:35

Does the advent of AI and it's

11:37

rapid evolution help defense

11:40

more or offense more?

11:41

I think it's I think it's like any mega

11:44

trend that we've witnessed both.

11:47

Right, So you think about AI, it's

11:49

ninety nine percent great

11:52

right in terms of what it's going to unlock for productivity,

11:54

for humanity, But it also makes

11:56

it a whole lot easier to build ransomware.

11:58

It's a whole lot easier to take different ways

12:01

into a system, right. But I think that's

12:03

true if you think about like the rise of the Internet,

12:05

right, all of a sudden, everyone was putting their data online

12:09

and you had to think of new ways to

12:11

stay ahead and keep that secure. And I don't think AI

12:13

is any different. You've got companies

12:15

like Palta, partnerships like Powell and IBM that

12:18

are constantly

12:21

scanning the landscape for not only the current threats,

12:23

but what's next, what's coming around the corner, what's

12:25

after AI? And so I think taking

12:28

it seriously and being prepared is probably the right

12:30

way of looking at it, as opposed to because

12:32

if you think about it too hard, you'll just want to crawl

12:35

into a corner and stuff everything under the mattress.

12:39

I am the CEO

12:42

of a regional

12:45

hospital chain, big distribute

12:47

healthcare system, so

12:50

a ton of data. The consequences

12:52

of being hacked and help for ransom

12:54

are life and death. Life and

12:56

death. When

12:59

you come so you you come down, You sit down

13:01

with me, and you chat with me. Walk

13:04

me through the kinds of things you would tell

13:06

me about what I need to get safer.

13:08

For example, let's start with one. Is

13:11

it likely that I'm spending too little or am I spending

13:13

money in the wrong place?

13:15

Great question, It depends

13:17

how you've broken it out. If

13:19

you are distributing all of your dollars

13:21

across a whole bunch of different tools,

13:24

it's likely you're just spending the wrong money. And

13:26

in fact, you know, putting it all in one place is

13:28

a way of potentially saving money but

13:30

keeping your security actually higher.

13:33

And I'd love to hear Jason, how you would approach

13:35

it. How we would approach it, of course, is by saying, you know

13:37

what, what does your environment look like?

13:40

You know, do you have the connected medical

13:42

devices into your EMR? Are

13:46

your respirators and ventilators all online?

13:48

Right? And so we would talk about, okay, here's how

13:50

you get coverage, and how the coverage

13:53

of both the firewalls as well as the detectors

13:56

all feedback into your security operation center

13:58

and you can manage it and and do your

14:00

learning with AI and keep

14:02

yourself securing.

14:03

So yeah, and I would say Christy and I

14:05

would go to the same point because if you get

14:08

under what she was just asking, it

14:10

is your data on prem

14:13

and when it's on prem, how

14:15

active is it across the

14:17

enterprise? And so that begins

14:19

the basis for the start. And then often you're

14:22

going to say, well, we actually take in data from

14:24

outside and then we also have the

14:27

circumstances. There's a lot of PII and

14:29

so that personal is the

14:31

personal information, right, Yeah,

14:34

And so now you're saying, okay, now

14:36

how are we securing that and where are

14:38

we securing it? And so you have to

14:41

start really thinking about the different

14:43

areas within that hospital

14:46

chain. Are you sharing that amongst

14:48

your hospitals? And now you start

14:50

to think of if I'm

14:52

saying no to a lot of that, it's like, well, then are you

14:54

as efficient as you want to be? So

14:56

there is that trade off of

14:59

you know, am I so tightly walled

15:01

that I'm not productive? And

15:03

so that's where we would start to say,

15:06

what's the outcome that you're trying to get to? All

15:08

Right, maybe you're good, Maybe you're you're good with your

15:10

five locations and you don't need to go

15:13

any further, but maybe you want to expand to fifty

15:15

and by the way, you're going to go crossport or you're going to

15:17

be in Toronto and in New York. Okay,

15:20

well then how do you do that? And

15:22

so I think that it's very easy

15:25

to start jumping into any

15:27

of the typical situations. But

15:30

the first question that you have to ask

15:33

you, as the hospital CEOs,

15:35

what's your objective? What are you

15:38

what are you trying to do? Because too

15:40

often what we see is that there's some

15:42

bright, new, shiny thing that everybody

15:44

wants to put in play. You know, it's

15:46

a sandwich looking for lunch and you go,

15:50

but what is it that you want to do as this Are

15:52

you doing research? Are your research hospital? Are

15:54

you more consumer oriented? So

15:56

those are the questions you start to ask because

15:59

they start to then tell a story in

16:01

line with what Christy questions. And

16:03

I think that that's where the again, the complement

16:06

is that instead of just saying, oh, well, that's

16:09

thanks for telling me all this, Malcolm, here's your

16:11

ten page strategy.

16:13

Go find somebody.

16:15

We have the benefit in IBM,

16:17

and is probably why I'm still there is.

16:19

You know, we're very unique.

16:20

We're the only company on the planet that

16:23

has a consulting business

16:25

at scale inside of a technology

16:27

company, and so we have

16:30

you know, the left brain, right brain, we're able

16:32

to do that, and then we're able to say, okay,

16:34

now which partners are going to be

16:37

most valuable for our clients.

16:39

What's going to work for you?

16:40

Isn't going to work for the manufacturer down the road,

16:43

isn't going to work for the consumer or CpG

16:45

company across the river. Those

16:48

things are very specific. The threats

16:51

and the scenes that I was talking about are

16:53

very specific. So that's where

16:55

it becomes very valuable to make sure that I'm

16:59

not just giving you some strategy

17:01

that's generic.

17:02

But everything as

17:04

a healthcare CEO, everything

17:06

I have done, almost everything I've done

17:09

over the last ten years, hasn't

17:11

it had the effect of increasing my vulnerability.

17:13

I want to digitize data within the hospital

17:16

used to be on pieces of paper. I want

17:18

doctors to go home and to be

17:20

able to seamlessly hook into stuff at work because

17:23

they got to do all their paperwork. I want to make sure the

17:25

diabetes people are speaking to the

17:27

organ transplant people. And so isn't

17:29

that everything I have done to kind of

17:32

keep up with the revolution in healthcare?

17:34

Isn't that also making me more and more vulnerable

17:37

to a bad actor.

17:38

It's such a great question because think about the quality

17:41

of healthcare delivery.

17:41

Right.

17:42

So now doctors aren't filling out forms,

17:44

they're spending time with patients, and so

17:46

the quality of care is improving and the vulnerability

17:49

is improving, right, And so I think that's

17:51

where having a strong cybersecurity

17:53

strategy actually enables

17:55

all of that. One of our products is our sas

17:57

product, and we tested it with some business application

18:00

and oftentimes the wrap is, oh, security

18:02

is going to slow you down, like you have to add a firewall,

18:04

you have to checkpoints. Our product actually

18:07

increases the velocity of your

18:09

ability to use that application because of the way

18:11

that it is queried through our system

18:14

as opposed to just through the regular network.

18:16

So it doesn't slow it down and in fact, it makes it run

18:19

more efficiently. That's just one

18:22

minor example. But back to the healthcare

18:24

question. I, as a patient

18:26

want my doctors accessing all the technology and talking

18:28

to each other and connecting the dots behind the scenes.

18:31

I also want my data to stay private, and

18:33

so having both a consulting

18:36

partner who understands how

18:38

to ask questions of the environment and of the applications

18:41

you're using, and who understands the industry

18:43

inside and out, and a technology partner

18:45

that builds and stays ahead of all of the

18:47

different threats come together and advise

18:49

you. I think is super important. When

18:52

you bring in a partner like IBM,

18:55

with a platform like Palalta that covers

18:58

all the different parts of your environment,

19:02

you're able to say, look, where where

19:04

are the vulnerabilities in the system, Where

19:06

are the different endpoints that we

19:08

need to have covered, and then just make sure you get

19:10

that breadth of coverage, and then

19:12

you're better able to so, yes, you've increased

19:14

the risk, but then you've mitigated it.

19:17

So to give so before

19:19

I retire my healthcare analogy,

19:21

because I was thinking about just trying to understand

19:25

the importance of this idea of having

19:27

a single platform.

19:29

So if this mudtal healthcare network

19:32

is typical, I've acquired a whole series

19:34

of over the last ten years. I bought a hospital

19:36

over here, some I got some physicians,

19:38

things that I snapped up over here about

19:41

a diagnostics company, and so

19:43

I have all of these legacy systems

19:45

and I had, like you said, maybe I got some

19:47

stuff in the cloud with one company, some stuff

19:49

with the cloud. And what you're saying is the

19:52

first step is to kind of rationalize

19:55

that put it on a single platform, so you

19:57

understand where your points of weakness

19:59

are as opposed to being blind to your points

20:02

of weakness.

20:04

There's yes,

20:06

although anyone who's done any

20:08

kind of M and A knows that that's a long

20:11

journey, right. So I think the first

20:13

step is just understanding where everything

20:15

is. And then you get on a path and you say,

20:17

where's the biggest risk. Let's let's neutralize

20:19

or mitigate that risk one at a time. The

20:22

thing about open end secure, you

20:24

know Palo Alto. We keep touting the benefits

20:27

of the platform. Everything on Palo Alto,

20:29

your risk is going to be mitigated and you're going to have the full visibility.

20:32

But you can't get there overnight. And

20:35

so we've got you know, thousands of integrations

20:37

with other technology companies, including our

20:39

partners, to make sure that we can capture

20:42

and have visibility into those those

20:44

endpoints in those systems as well. And

20:46

so I think step one is just figure out

20:48

where everything is. Just get the scan. So Polta

20:50

has a couple of products where you can kind of deploy

20:52

and get a view of your attack surface. I

20:55

love the analogy. Just like a digital

20:57

environment is a house, right and so like you have your front

21:00

lock, of course, because probably they're going to try

21:02

the front door first. But that's not

21:04

all you're going to do, right, You're going to make sure the whole you

21:06

know, the windows are locked and there's an alarm system

21:08

and all of that. And I

21:11

think that's how you have to think about it, is just how

21:13

do we cover the whole service?

21:15

So everyone laid, people like me have

21:17

been bombarded over it seems like over

21:19

the last year with one

21:21

thing another about how quickly AI

21:24

is moving forward and how big of a deal it is

21:26

suddenly is going to be in the economy. What

21:28

is the impact of

21:31

that dramatic change

21:33

in AI's capabilities on this

21:36

cybersecurity question? So what does

21:38

it mean if you're defending somebody that you

21:40

now have these sophisticated AI tools you

21:42

just suppose.

21:44

I think that AI becomes the force multiplier

21:47

for cyber To

21:50

think about cyber Before

21:52

it was just locking your doors, locking

21:55

the windows, and if you were

21:57

really good, you had an alarm system. You

21:59

know, Now

22:02

with AI, you can say,

22:04

well, I can predict what's

22:06

going to happen, I can see around the corner.

22:08

I know, I can leave my windows open upstairs,

22:10

and it's fine and it's okay.

22:12

I mean because why because the AI is

22:14

running a million simulations.

22:17

It can And that's exactly it.

22:19

It becomes the intelligent

22:21

part of that AI. It's not

22:23

artificial, it's augmented. So you now

22:25

have this new capability to see around

22:27

corners and so you're able

22:30

to do the jobs of yesterday more

22:32

effectively.

22:34

And the.

22:36

Queries that you were doing and that's all you're really

22:38

doing, now you're doing them, you know, faster,

22:41

You're able to access even more data

22:44

and you're able to then make

22:47

it more secure. So that's why AI

22:50

becomes a force multiplier.

22:51

Yeah, and just talk about

22:53

the faster part. What does faster

22:56

mean in practical terms? If

22:58

you're trying to defend an enterprise against a cyber

23:00

attack, what does speed matter in that environment?

23:03

You're always trying to find a place

23:06

through I go back to you. We brought

23:08

up the army. You always how do you break the line?

23:10

How do you find a penetration point? And

23:12

when you think about you know, pin testing,

23:15

penetration testing.

23:16

Where are those?

23:18

So if you're able to do that faster than the bad

23:20

guys, and not only faster, but you're

23:22

picking more probable points.

23:24

This is back to the intelligence.

23:26

I could waste time doing penetration

23:28

testing someplace where. That's why I mentioned leave. If

23:31

they can't get in the second story windows,

23:33

why are you spending time trying it? So

23:36

that becomes more effective. So

23:38

that's when I think of speed. That's what I

23:41

think of because with not just speed,

23:43

I think it's also what's effective.

23:45

Just to put a put a fine point on it. So I found

23:47

a way in. Okay, Now what I don't know where

23:49

the jewelry is, so I have to look around and see if

23:51

there's any hidden gems and

23:53

try to find my way. That used to take a week,

23:55

two weeks, or of seven to fourteen days. Now

23:58

it's hours right so there in

24:00

and they can actually expltrate data within less

24:02

than a day. The metric

24:04

we use in the security operation center is meantime

24:07

to detect, so to see anyone's there, meantime

24:10

to respond and remediate to get them out right.

24:12

That used to be also you

24:14

know, seven eight, nine, ten days. Now

24:18

it needs to be less than an hour. And

24:20

with our AI based security

24:22

operations platform, it is. Now

24:25

you've got one tool that whether it's

24:27

all peloton networks or whether it's just you know,

24:29

hoofringing data from other places and you're able

24:31

to see it all together, so you actually get fewer alerts.

24:33

So you get from thousands of alerts

24:35

down to one hundred alerts,

24:37

right, and you can investigate them and you investigate them using

24:40

AI too. And AI is today

24:42

it's today's threat, but it's you know, you think about

24:45

threat and opportunity to think about what's next. You

24:47

always have to be kind of evolving and you have

24:49

to think.

24:50

We talk about threat and risk, and you know, we

24:52

didn't tell you know, what is the cost of

24:55

cyber some type of penetration.

24:57

It's typical cost is for four

25:00

and a half million dollars and

25:02

that's just in labor

25:05

and remediation. If you think

25:07

about reputational risk

25:09

as well, our Institute for Business

25:11

Value to the study and found it in twenty

25:14

twenty three and they were thirty nine banks that

25:16

we watched that suffered

25:19

a reputational risk market

25:21

value of one hundred and thirty billion dollars.

25:24

And so you start to think, wow, that's just

25:27

reputational risk. So

25:29

that's what's at stake here, and it's

25:31

only that is only going to get bigger.

25:34

So one of the piece we haven't talked

25:36

about about AI that I find super interesting

25:38

because we've been talking essentially about like

25:41

the terminator, the robots fighting robots, right, Like

25:43

whose robots are quicker? Like I'm designing

25:45

at tax and I'm defending against tax, and I think that's

25:48

that's super important. But we

25:51

recently launch and our working at IBM on our

25:53

AI security product to actually secure the use

25:55

of AILA because it also opens up another set of

25:57

threat factors. I'll give you an

25:59

exampimple. I'm a marketing

26:02

executive now for your hospital. So I work

26:04

for you, and you want to announce

26:06

the launch of a new center,

26:09

and so I upload all the information about

26:11

all the patients and our you know how we do

26:13

things into chat GPT to write the PR for me.

26:15

Well, I've also just uploaded to chat GPT a whole

26:17

bunch of secrets, right. So

26:20

it's it's how employees are using AI, because

26:22

I think, you know, some companies are sort of building

26:24

their own language models and their own AI applications

26:27

that they want to keep secure. Others are

26:29

just curious about how their employees are using AI

26:31

applications on the shelf. And

26:33

so we announced in May a product where you can

26:35

actually scan and see

26:37

how AI is being used in your enterprise

26:40

and within We made the announcement with the

26:42

GA was last month, but we made the announcement in May,

26:44

and we had immediately thousands of CIOs

26:47

signing up because just understanding you

26:49

know who's using what it's another open

26:51

question because you know, we talk about AI

26:53

enhancing productivity and all the benefits it's going to

26:55

bring, but it brings it brings risks, not just

26:58

in how it's being used by the threat actors,

27:00

but also you know what other vulnerabilities

27:03

That.

27:03

Excise is the eye that you does

27:06

that system tell you what's a problematic

27:08

use?

27:09

It does, so what what it does, and

27:11

you've got to train it right. But what it does is say

27:13

this is this is outside of your policy. So

27:16

CIOs will set policies on here's what

27:18

is acceptable and not acceptable use. So we'll be able

27:20

to scan and say these these falling uses are outside

27:22

of policy, and then it'll punt and say I

27:24

think this is too restrictive, I think this is too permissive,

27:27

and then you can sort of update your policies from there. That's

27:30

just sort of the visibility piece, and then there's the

27:33

run time piece, which will actually stop you from using

27:35

it. So you go and say, Okay, here's all my patient's

27:37

social security numbers. I'm going to upload them to chat

27:39

GPT to you know, get

27:41

an understanding of like where they all live. I

27:43

don't know what why you would possibly do

27:45

that, but let's say you were, and then you know,

27:48

it'll note that looks like a social security number. You can't

27:50

upload that into your prompt, so it.

27:51

Will stop before you Yeah,

27:54

thoughtful voice

27:56

over your shoulder, just to remind

27:58

you not to do something silly exactly.

28:01

But this is just.

28:02

Talk a little bit more about adding AI

28:04

into this mix. You say it's

28:06

a force multiplier. It's a really interesting

28:09

dig into that. What other instances

28:11

of what that means?

28:13

Well?

28:13

How does the balance between AI

28:16

and human expertise

28:19

work in the kind of next generation of cybersecurity?

28:23

I think the.

28:25

Common way to look at as it

28:27

back to the force multipliers, It's

28:30

not going to be is your AI better?

28:32

But can you use it better? Can you ask

28:35

your AI the right questions?

28:37

Are you well trained? So the competition really

28:39

becomes your use of AI? And

28:42

are you pointed it in the right direction?

28:45

You have fifty people can they

28:47

do the work of two hundred and fifty,

28:50

and can they do it in a safe and secure manner,

28:53

So you're not opening up more risk

28:55

based on or too much risk is your risk

28:58

tolerance in order to get the outcome. So

29:00

that's why I think there's the opportunity.

29:02

And so you see this truly

29:05

as a force multiplier because the first thing people

29:07

go, oh, you're going to get rid of people, Oh,

29:09

the people portion is still still

29:12

going to be just as important because they're doing

29:15

that other piece of work.

29:16

One of my favorite statistics is that there are now

29:18

more bank tellers in the US than there were

29:20

in nineteen sixty before the ATM

29:22

was invented. Right, So, but it used to be you would

29:25

go to your bank because you had to. I

29:27

remember doing this. You go, you fill out your deposit

29:29

slip, you hand it to the teller and they give you

29:31

your cash. And then ATMs are invented,

29:33

and it's like, oh, no, what's going to happen all these jobs and now

29:36

there's more, Right, but you're not

29:38

withdrawing money from a bank teller.

29:40

You're now doing more sophisticated transactions. And

29:42

so I think it's similar with AI,

29:44

Right, Like you want people doing things that only

29:46

people can do.

29:47

The human element remains absolutely central

29:50

in all of this. How

29:52

do you make sure that

29:54

your cybersecurity folks are

29:57

equipped to handle high value tasks, are

29:59

ready for the this increasing responsibility.

30:02

There's a couple of ways to answer this, but I think

30:05

the more you're able to automate the

30:08

routine and the mundane tasks. For example,

30:11

the bulk of cybersecurity happens

30:13

in the security operations center. There's analysts

30:16

who are sitting in that center. If they're spending all day

30:18

either configuring alerts

30:21

or responding to alerts, they're not able to do

30:23

the advanced sort of threat hunting and analysis

30:26

work. And so I think a big chunk of it is just

30:28

freeing up their time to be able to

30:30

do the more advanced strategic work.

30:32

And a lot of the automation tools based on AI, like

30:35

our cortex XIM product, is

30:38

it's designed to free up their time in order

30:40

to be able.

30:41

To do that, And from

30:43

our perspective, is making sure that it's a

30:45

requirement to make sure that you have

30:48

the qualifications because people can easily get

30:50

used to.

30:51

Doing what they've always done.

30:52

I know this, and that's what I do

30:55

you say, well, now, all

30:57

the threat actors are learning on

30:59

the fly. They're trying to always outsmart you. So

31:02

it's in your best interest, our best

31:04

interest, our client's best and partners best

31:06

that you are on the front leaning

31:09

edge of that learning capability.

31:11

If you're talking to a client he wants to develop a

31:13

kind of unified cybersecurity

31:16

strategy, what's the best single

31:19

piece of advice you can give them?

31:22

You should have a single platform. It's

31:26

hard not to answer that, but it is true.

31:28

I mean all joking aside having you

31:31

know the best of breed solutions that are

31:33

all talking to each other and able to stitch together

31:36

and identify threats before human might be able

31:38

to. That's number one, and number

31:40

two is making sure you have visibility

31:42

on all elements so you're

31:44

able to cover your whole environment and understand

31:46

how people are accessing it.

31:48

I'd say, think like a bad actor.

31:50

Yeah, always think outside

31:52

in because you get comfortable the

31:55

other way around.

31:57

You guys work together with a Push

31:59

and five company, and I'd

32:02

love for you to talk a little bit about use that as a kind

32:04

of case study for what this collaboration

32:07

between the two your two companies

32:09

looks like. When you work with

32:11

a cloud.

32:12

It really was you know, IBM leading on

32:15

a digital transformation for this

32:17

client that wanted to move their applications into the cloud.

32:19

And so you're asking a lot of questions about how does AI

32:22

increase the risk and the surface area.

32:24

Those same questions ten years ago were asked about

32:26

the cloud, and we're still on the journey where

32:28

where companies are migrating into the cloud.

32:30

We're not anywhere near finished that yet.

32:32

And so there's two pieces to a cloud migration. One

32:34

is just refactoring for the cloud to make sure the application

32:36

works effectively in the cloud. And the second

32:39

is security. And then you built in security by

32:41

design using poll does prison

32:43

of cloud products to make sure that not only did

32:45

you have the visibility so our cloud product

32:47

you can scan and see where the vulnerabilities are. And

32:50

then there's also you know cloud firewalls

32:53

essentially that will keep bad actors

32:55

out and keep the cloud instance

32:57

secure.

32:59

If we sit down, I don't have this conversation five

33:01

years from now, which I actually hope we do.

33:04

Be fun.

33:07

This pretend is twenty twenty nine. Tell

33:09

me what are you happy about in twenty twenty nine.

33:12

I think twenty twenty nine, quantum computing

33:15

is mainstream. I

33:17

think quantum computing is

33:21

now quantum safe, where we're

33:23

using quantum computing

33:25

to make sure that those bad

33:27

actors aren't as bad as

33:29

they used to be back in twenty twenty

33:31

four, and we're seeing

33:33

around the corners and that

33:35

we're empowering our palo

33:38

Alto relationship. That

33:40

in twenty twenty nine is

33:42

the premiere type of capability

33:45

that people are looking at when they

33:47

think of what used to be AI

33:49

and now is quantum capability.

33:51

Yeah, yeah, I

33:54

think for AI, everyone's

33:56

just using it as part of their job. The way email

33:59

was an innovation in the nineties, the way you

34:01

know cloud was an innovation in the twenty

34:03

tens, and we thought, how are we going to use

34:05

this? What impact is it going to have on productivity?

34:08

All these people who are spending their days typing up memos,

34:10

like what are they going to do? We're going to be past that

34:13

fear and we're all going to understand that

34:16

it is this like truly positive force

34:18

multiplier. For you know, every employee

34:20

is able to do their best work

34:22

and spend their time

34:25

on the things that only they can do, and then the

34:27

AI is doing the rest of that for them.

34:29

Right, AI, it's fun to

34:31

enable many things to work

34:33

together, and it won't be just one language

34:36

model.

34:36

We won't even think about.

34:37

It will be the difference between

34:40

you know, Malcolm having a fax

34:42

machine, stereo and a telephone

34:45

and a memo board. Now it's in

34:47

your pocket and it's all one thing and

34:50

you don't even call that, you know. I said, walk them into

34:52

my kids the other day and they're like, what's a walk man? So

34:56

I do think it will. It'll be part

34:58

of the past, and it will be the stock of the

35:01

seamless connection. That is, secure

35:03

seamless connection, of HR,

35:06

of finance, of distribution,

35:08

logistics, of billing, all.

35:10

Of those will have a capability

35:12

to work together. Yeah.

35:15

I have to do some social quick fire questions.

35:18

You guys ready, all right? What's

35:21

the number one thing that people misunderstand about

35:23

AI?

35:24

The reliance on data? What

35:27

do you mean by that?

35:28

I think that it's just assumed that it's happening

35:31

and it can just go out and grab data

35:33

anywhere.

35:35

Yeah, you have.

35:36

To have good data, reliable data,

35:38

and access to the data.

35:40

I think people are too afraid of it.

35:42

Checkbox and image generators are the biggest

35:45

things in consumer AI right now? What do you think

35:47

is that next big business application?

35:49

Jason, I think it's the tying together

35:51

of multiple capabilities. I'm hinting

35:53

towards this earlier is. I think tying

35:55

together the disparate systems

35:58

that sit in different parts of the organization, front all this

36:00

back office, making it one office and tying

36:02

together those different functions.

36:03

That's it.

36:05

I mean, it's workflow automation. I think back

36:07

to your point on the reliance on data

36:09

seems easy. It's a lot harder than you think because

36:11

you have to have everything set up and exactly the right way to

36:13

get all of your systems automated and the

36:16

sort of the more boring jobs taken care of

36:18

so that humans could do the strategic ones.

36:22

How are you already using AI in

36:24

your day to day life?

36:27

I mean I use it at

36:29

work all the time, and then I've

36:31

found right now I go to chat, GPT instead

36:33

of Google to look things up. I like

36:36

having a conversation.

36:38

We have a wonderful capability

36:40

in our consulting business called our

36:43

consulting assistant and consulting

36:45

advantage is the proper name for it, but I look

36:47

at it as.

36:48

That assistant and it's a force multiplier

36:51

for me.

36:51

So if I need to pull

36:53

together content proposals

36:55

with the teams, we go straight to that.

36:58

We are one more we Here's so many definitions

37:00

of open related to technology. How

37:03

do you define it and how does the concept

37:05

help you innovate?

37:07

By definition? In cybersecurity,

37:09

you don't want to be too open, right, So I think

37:12

we enable openness with

37:14

this concept of zero trust and saying like everyone's

37:17

invited in as long as you have the right credentials, right.

37:19

So that's that's one way, and then the other way

37:21

is just making sure you're connected to all

37:24

the different systems in order to

37:26

be able to have that visibility and see what's happening,

37:28

because if you are blind, that's

37:31

the minute you have that vulnerability.

37:33

And I'd say it's moving

37:36

quickly with security,

37:39

it sounds contradictory open.

37:41

Oh then it means you're not safe. No, you are safe

37:43

and you can move faster.

37:44

Yeah, thank you so much.

37:45

It's fun.

37:46

Thanks a lot, Thank you great. We'll see you in five years.

37:49

Five years, man,

37:52

I'll be old in five years. Thank

37:55

you to Jason Kelly at IBM and

37:57

Christy Frederick's at Polo Alto

38:00

networks for that fascinating conversation

38:03

about the threats and opportunities in cybersecurity

38:06

today. As

38:08

Jason and Christie stressed, AI can

38:10

be a force multiplier for enterprise

38:13

across industries. When

38:15

you're working with multiple products and have your data

38:18

in distributed environments, you

38:20

need technology that will work across

38:22

your organization, and with Palo

38:24

Alto Networks platform, you

38:26

can enhance cyber resiliency

38:29

and simplify your operations.

38:32

Through their collaboration, IBM and

38:34

Palobalto Networks are charting the

38:36

future a fully integrated open

38:39

end to end security solutions.

38:43

Smart Talks with IBM is produced by Matt

38:45

Romano, Joey Fishground, Amy

38:48

Gaines McQuaid, and Jacob Goldstein.

38:51

We're edited by Lydia Jane Kott.

38:53

Our engineers are Sarah Bugaier and

38:55

Ben Tolliday. Theme song by Gramoscope

38:58

Special thanks to the eight Bar and IBM

39:00

teams, as well as the Pushkin Marketing

39:03

team. Smart Talks with IBM

39:05

is a production of Pushkin Industries and Ruby

39:07

Studio at iHeartMedia. To

39:09

find more Pushkin podcasts, listen

39:12

on the iHeartRadio app, Apple Podcasts,

39:14

or wherever you listen to podcasts. I'm

39:17

Malcolm Glapham. This

39:20

is a paid advertisement from IBM.

39:22

The conversations on this podcast don't

39:25

necessarily represent IBM's positions,

39:28

strategies or opinions.

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features